Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have identified in Apple iOS. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and cause arbitrary code to be executed on the target user's system. A local user can bypass the screen lock.A remote user...
Last Update Date: 9 Mar 2012 11:28 Release Date: 9 Mar 2012 5057 Views

RISK: Medium Risk

Medium Risk

Joomla! Multiple Vulnerabilities

Two vulnerabilities have been identified in Joomla!, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Certain input passed to the Highlight plugin is not properly sanitised before being returned to the user. This can be exploited to execute...
Last Update Date: 8 Mar 2012 12:15 Release Date: 8 Mar 2012 4451 Views

RISK: High Risk

High Risk

Apple Safari Plug-in Unloading Vulnerability

A vulnerability has been identified in Apple Safari, which can be exploited by malicious people to compromise a user's system.  The vulnerability is caused due to plug-ins being unloaded when navigating to a new page while the user interacts with the plug-in...
Last Update Date: 8 Mar 2012 12:15 Release Date: 8 Mar 2012 4375 Views

RISK: High Risk

High Risk

FreeType Multilpe Vulnerabilities

Multiple vulnerabilities have been identified in FreeType, which can be exploited by malicious people to potentially compromise an application using the library. An error in src/type1/t1parse.c when processing dictionaries can be exploited to cause heap-based memory corruption via a specially...
Last Update Date: 8 Mar 2012 12:14 Release Date: 8 Mar 2012 4342 Views

RISK: High Risk

High Risk

RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. An unspecified error can be exploited to cause a buffer overflow.Successful exploitation may allow execution of arbitrary code.
Last Update Date: 8 Mar 2012 12:12 Release Date: 8 Mar 2012 4557 Views

RISK: High Risk

High Risk

BlackBerry OS / Tablet OS Unspecified WebKit Vulnerability

A vulnerability has been identified in BlackBerry OS and BlackBerry Tablet OS, which can be exploited by malicious people to compromise a vulnerable device. The vulnerability is caused due to an unspecified error in the WebKit browser engine. Successful exploitation may allow execution of arbitrary code. ...
Last Update Date: 7 Mar 2012 09:45 Release Date: 7 Mar 2012 4536 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited to cause a crash and potentially allow an attacker to take control of the affected system or cause a denial-of-service condition. A memory corruption vulnerability in Matrix3D that could lead to...
Last Update Date: 6 Mar 2012 11:13 Release Date: 6 Mar 2012 4478 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multipule vulnerabilities have been identified in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. A use-after-free...
Last Update Date: 6 Mar 2012 11:12 Release Date: 6 Mar 2012 4378 Views

RISK: Medium Risk

Medium Risk

Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

A vulnerability has been identified in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap...
Last Update Date: 6 Mar 2012 Release Date: 2 Mar 2012 4469 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Mulitple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users execute arbitrary code, cause a denial-of-service condition, operate with escalated privileges and bypass security restrictions. 
Last Update Date: 1 Mar 2012 14:45 Release Date: 1 Mar 2012 4756 Views